A vulnerability was found in ArangoDB up to 3.8.3. It has been rated as problematic. This issue affects some unknown functionality of the component Password Change Handler. Applying the patch e9c6ee9dcca7b9b4fbcd02a0b323d205bee838d3 is able to eliminate this problem. The bugfix is ready for download at github.com.
ArangoDB up to 3.8.3 Password Change session expiration
- Virtual Patching
- November 18, 2021
- 11:10 am
CVE-2024-22144 : ELI SCHEETZ ANTI-MALWARE SECURITY AND BRUTE-FORCE FIREWALL PLUGIN CODE INJECTION
Description Improper Control of Generation of Code (‘Code Injection’) vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows
CVE-2024-26922 : LINUX KERNEL UP TO 6.9-RC4 AMDGPU PRIVILEGE ESCALATION
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more
CVE-2024-21511 : MYSQL2 UP TO 3.9.6 READCODEFOR TIMEZONE CODE INJECTION
Description Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the